Abstract
Evolving behaviours by spammers on online social networks continue to be a big challenge; this phenomenon has consistently received attention from researchers in terms of how it can be combated. On micro-blogging communities, such as Twitter, spammers intentionally change their behavioral patterns and message contents to avoid detection. Many existing approaches have been proposed but are limited due to the characterization of spammers’ behaviour with unified features, without considering the fact that spammers behave differently, and this results in distinct patterns and features. In this study, we approach the challenge of spammer detection by utilizing the level of focused interest patterns of users. We propose quantity methods to measure the change in user’s interest and determine whether the user has a focused-interest or a diverse-interest. Then we represent users by features based on the level of focused interest. We develop a framework by combining unsupervised and supervised learning to differentiate between spammers and legitimate users. The results of this experiment show that our proposed approach can effectively differentiate between spammers and legitimate users regarding the level of focused interest. To the best of our knowledge, our study is the first to provide a generic and efficient framework to represent user-focused interest level that can handle the problem of the evolving behaviour of spammers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992–3000 (2013)
Benevenuto, F., et al.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS) (2010)
Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: detecting compromised accounts on social networks. In: NDSS, 2013. NDSS, San Diego (2013)
Kaur, R., Singh, S., Kumar, H.: Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112, 53–88 (2018)
Fu, Q., et al.: Combating the evolving spammers in online social networks. Comput. Secur. 72, 60–73 (2018)
Sedhai, S., Sun, A.: Semi-Supervised Spam Detection in Twitter Stream. IEEE Trans. Comput. Soc. Syst. 5(1), 169–175 (2018)
Almaatouq, A., et al.: If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15(5), 475–491 (2016)
Sedhai, S., Sun, A.: Hspam14: a collection of 14 million tweets for hashtag-oriented spam research. In: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, Santiago, Chile (2015)
Alfifi, M., Caverlee, J.: Badly evolved? exploring long-surviving suspicious users on twitter. In: International Conference on Social Informatics. Springer, Cham (2017)
Ruan, X., et al.: Profiling online social behaviors for compromised account detection. IEEE Trans. Inf. Forensics Secur. 11(1), 176–187 (2016)
Shen, H., et al.: Discovering social spammers from multiple views. Neurocomputing 255, 49–57 (2016)
Liu, L., et al.: Detecting “Smart” spammers on social network: a topic model approach. arXiv preprint arXiv:1604.08504 (2016)
Nilizadeh, S., et al.: POISED: spotting twitter spam off the beaten paths. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, Dallas (2017)
Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022, 2003
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: The 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, New York (2010)
Alghamdi, B., Xu, Y., Watson, J.: Malicious behaviour analysis on twitter through the lens of user interest. In: Boo, Y.L., Stirling, D., Chi, L., Liu, L., Ong, K.-L., Williams, G. (eds.) AusDM 2017. CCIS, vol. 845, pp. 233–249. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-0292-3_15
Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: A long-term study of content polluters on twitter. In: International Conference on Weblogs and Social Media ICWSM, AAAI (2011)
Hall, M.A.: Correlation-based feature selection for machine learning, in Computer Science, p. 171. Hamilton, Waikato (1999)
Witten, I.H., et al.: Data Mining: Practical Machine Learning Tools and Techniques, 4th edn. Morgan Kaufmann, United States (2016)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Alghamdi, B., Xu, Y., Watson, J. (2018). A Hybrid Approach for Detecting Spammers in Online Social Networks. In: Hacid, H., Cellary, W., Wang, H., Paik, HY., Zhou, R. (eds) Web Information Systems Engineering – WISE 2018. WISE 2018. Lecture Notes in Computer Science(), vol 11233. Springer, Cham. https://doi.org/10.1007/978-3-030-02922-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-02922-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02921-0
Online ISBN: 978-3-030-02922-7
eBook Packages: Computer ScienceComputer Science (R0)